CN113393629B - Intrusion behavior detection method and device and multi-channel video monitoring system - Google Patents

Intrusion behavior detection method and device and multi-channel video monitoring system Download PDF

Info

Publication number
CN113393629B
CN113393629B CN202110570339.5A CN202110570339A CN113393629B CN 113393629 B CN113393629 B CN 113393629B CN 202110570339 A CN202110570339 A CN 202110570339A CN 113393629 B CN113393629 B CN 113393629B
Authority
CN
China
Prior art keywords
image
frame
current frame
frame rate
intrusion behavior
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110570339.5A
Other languages
Chinese (zh)
Other versions
CN113393629A (en
Inventor
冯亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Dahua Technology Co Ltd
Original Assignee
Zhejiang Dahua Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Dahua Technology Co Ltd filed Critical Zhejiang Dahua Technology Co Ltd
Priority to CN202110570339.5A priority Critical patent/CN113393629B/en
Publication of CN113393629A publication Critical patent/CN113393629A/en
Application granted granted Critical
Publication of CN113393629B publication Critical patent/CN113393629B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/20Analysis of motion
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/30Subject of image; Context of image processing
    • G06T2207/30196Human being; Person

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Closed-Circuit Television Systems (AREA)

Abstract

The application relates to an intrusion behavior detection method, an intrusion behavior detection device, a multi-channel video monitoring system, an electronic device and a storage medium, wherein the method comprises the following steps: acquiring an image sequence to be detected, wherein the frame rate of the image sequence is a first frame rate; detecting a moving target of the image sequence according to a second frame rate, and judging whether a target moving in a preset area exists in a current frame image in the image sequence; under the condition that a current frame image has a target moving in a preset area, carrying out intrusion behavior detection on images of preset frame numbers before and/or after the current frame image according to a first frame rate, wherein the first frame rate is greater than a second frame rate; and sending alarm information under the condition that at least one frame of image before and/or after the current frame of image has intrusion behaviors. By the method and the device, the problem of low accuracy rate of the monitoring system in detecting the intrusion behavior in the related technology is solved, and the technical effect of improving the accuracy rate of the monitoring system in detecting the intrusion behavior is achieved.

Description

Intrusion behavior detection method and device and multi-channel video monitoring system
Technical Field
The present application relates to the field of video surveillance technology, and in particular, to a method and an apparatus for detecting intrusion behavior, a multi-channel video surveillance system, an electronic apparatus, and a storage medium.
Background
With the maturity of image analysis algorithms and the improvement of chip computing power, the application of video intelligent analysis in the field of video monitoring is more and more extensive, and the intelligent analysis in the monitoring field can be divided into two categories, namely front-end intelligence and back-end intelligence, according to the position of algorithm operation. The front-end intelligence mainly runs on the network camera, and the rear-end intelligence mainly runs on equipment such as an intelligent server and an intelligent NVR.
Wherein, intrusion behavior detects is an intelligent monitoring technique based on security protection camera device, can effectively solve only and can't accomplish to observe the monitor screen often by the manpower, can't in time discover the problem of intrusion behavior, simultaneously behind the discovery intruder, can be more convenient track the intruder, saved the required manpower and materials of forbidden regional control greatly.
At present, the intrusion behavior detection method in the related art usually creates an algorithm processing logic for each video channel in the intelligent NVR, sends an image to be detected to algorithm processing according to a fixed frame rate, and judges whether each video channel has an area intrusion event, wherein each video channel is completely parallel and independent.
The more the intelligence NVR inserts video channel quantity, then single intelligent NVR's calculation load just is higher, and when calculation load reached the upper limit, then this intelligence NVR will unable image that more video channels of detection sent into, in order to improve the video channel quantity that intelligence NVR can simultaneous processing, often can realize through the processing frame rate that reduces intelligence NVR, and then promote the detection efficiency that monitored control system intrusion behavior detected. However, in such technical solutions, after the processing frame rate of the intelligent NVR is reduced, the miss detection probability of the intelligent NVR is increased, and for a target moving fast, it may not be possible to capture whether an intrusion behavior occurs. For example, determination of intrusion behavior requires capturing at least three actions of a target: the target is outside the area, the target is superposed with the area line, and the target is in the area, and the intrusion behavior of the target can be judged only if the three continuous actions are captured. Therefore, if the processing frame rate of the intelligent NVR is reduced, a situation that one action cannot be captured may occur, and the accuracy of the monitoring system for detecting the intrusion behavior is further reduced.
At present, no effective solution is provided aiming at the problem of low accuracy of detecting the intrusion behavior by a monitoring system in the related technology.
Disclosure of Invention
The embodiment of the application provides an intrusion behavior detection method and device, a multi-channel video monitoring system, an electronic device and a storage medium, so as to at least solve the problem of low accuracy rate of the monitoring system in the related art in detecting intrusion behaviors.
In a first aspect, an embodiment of the present application provides an intrusion behavior detection method, including: acquiring an image sequence to be detected, wherein the frame rate of the image sequence is a first frame rate; detecting a moving target of a plurality of frames of images in the image sequence according to a second frame rate, and judging whether a target moving in a preset area exists in a current frame of image in the image sequence; under the condition that the current frame image has a target moving in a preset area, carrying out intrusion behavior detection on images with preset frame numbers before and/or after the current frame image according to the first frame rate, wherein the first frame rate is greater than the second frame rate; and sending alarm information under the condition that at least one frame of image before the current frame of image and/or after the current frame of image has intrusion behaviors.
In some embodiments, performing moving object detection on multiple frames of images in the image sequence at a second frame rate, and determining whether an object moving in a preset area exists in a current frame of image in the image sequence includes: carrying out intrusion behavior detection on the multi-frame images in the image sequence according to the second frame rate, and judging whether the current frame image in the image sequence has intrusion behavior or not; under the condition that the intrusion behavior does not exist in the current frame image, carrying out moving object detection on the current frame image, and judging whether an object moving in a preset area exists in the current frame image or not; and sending alarm information under the condition that the current frame image has the intrusion behavior.
In some of these embodiments, the moving object detection comprises: determining that a preset area in the current frame image covers a preset tripwire in the current frame image; performing motion detection on the preset area to obtain a motion area in the preset area; performing target detection on the current frame image to obtain a plurality of targets in the current frame image; and judging whether the position area of the target is overlapped with the motion area, and determining that the target moving in a preset area exists in the current frame image under the condition that the position area of the target is overlapped with the motion area.
In some of these embodiments, the trip wire comprises at least one of: one-way and two-way trip wires; under the condition that the trip wire comprises a one-way trip wire, the preset area covers the one-way trip wire, and the coverage area of the preset area on the arrow side of the one-way trip wire is larger than the coverage area on the other side of the one-way trip wire; or in the case that the tripwire comprises a bidirectional tripwire, the preset area covers the bidirectional tripwire, and the coverage of the preset area on the first arrow side of the bidirectional tripwire is equal to the coverage of the preset area on the second arrow side of the bidirectional tripwire.
In some embodiments, the performing, at the first frame rate, intrusion behavior detection on an image of a preset number of frames before and/or after the current frame image includes: detecting intrusion behaviors of multiple frames of images in a buffer queue according to the first frame rate, wherein the buffer queue comprises images with preset frame numbers before the current frame of image; and under the condition that the images with the preset frame number in the cache queue have no intrusion behavior, detecting the intrusion behavior of the images with the preset frame number after the current frame image according to the first frame rate.
In some of these embodiments, before acquiring the sequence of images to be detected, the method further comprises: acquiring a video to be detected by using a camera device, wherein the frame rate of the video to be detected is a third frame rate; and performing uniform frame loss processing on the video to be detected to obtain an image sequence to be detected with a frame rate of a first frame rate, wherein the third frame rate is greater than the first frame rate.
In a second aspect, an embodiment of the present application provides an intrusion detection device, including: the device comprises an acquisition module, a processing module and a display module, wherein the acquisition module is used for acquiring an image sequence to be detected, and the frame rate of the image sequence is a first frame rate; the first detection module is used for carrying out moving target detection on a plurality of frames of images in the image sequence according to a second frame rate and judging whether a target moving in a preset area exists in a current frame of image in the image sequence; a second detection module, configured to, when the current frame image has a target moving in a preset region, perform intrusion behavior detection on images with a preset frame number before and/or after the current frame image according to the first frame rate, where the first frame rate is greater than the second frame rate; and the alarm module is used for sending alarm information under the condition that at least one frame of image before the current frame of image and/or after the current frame of image has intrusion behaviors.
In a third aspect, an embodiment of the present application provides a multi-channel video monitoring system, including: the system comprises a plurality of camera devices, a video acquisition device and a video processing device, wherein each camera device is used for acquiring a video to be detected of one video channel; a back-end processing device, the back-end processing device being in communication connection with each of the image capturing devices, respectively, the back-end processing device being configured to execute the intrusion behavior detection method according to the first aspect.
In a fourth aspect, an embodiment of the present application further provides an electronic apparatus, including a memory and a processor, where the memory stores a computer program, and the processor is configured to execute the computer program to perform the intrusion behavior detection method according to the first aspect.
In a fifth aspect, an embodiment of the present application further provides a storage medium, where a computer program is stored in the storage medium, where the computer program, when executed by a processor, implements the intrusion behavior detection method according to the first aspect.
Compared with the related art, the intrusion behavior detection method, the device, the multi-channel video monitoring system, the electronic device and the storage medium provided by the embodiment of the application perform moving object detection on multiple frames of images in the image sequence according to the second frame rate, judge whether the current frame of image in the image sequence has an object moving in the preset area, perform intrusion behavior detection on the images of the preset frame number before and/or after the current frame of image according to the first frame rate greater than the second frame rate under the condition that the current frame of image has the object moving in the preset area, and finally send alarm information under the condition that at least one frame of image before and/or after the current frame of image has the intrusion behavior, so that the problem of low accuracy of the monitoring system in detecting the intrusion behavior in the related art is solved, and the technical effect of improving the detection accuracy of the monitoring system in detecting the intrusion behavior is achieved.
The details of one or more embodiments of the application are set forth in the accompanying drawings and the description below to provide a more concise and understandable description of the application, and features, objects, and advantages of the application.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
FIG. 1 is a flow chart of an intrusion behavior detection method according to an embodiment of the application;
FIG. 2 is a schematic diagram of a preset area setting according to a first embodiment of the present application;
FIG. 3 is a schematic diagram of a preset area setting according to the second embodiment of the present application;
FIG. 4 is a schematic diagram of a preset area setting according to the third embodiment of the present application;
FIG. 5 is a diagram illustrating a preset region setting according to a fourth embodiment of the present application;
FIG. 6 is a schematic diagram illustrating a flow of each frame of image in an image sequence according to an embodiment of the present application;
FIG. 7 is a flow chart of an intrusion behavior detection method according to a preferred embodiment of the present application;
fig. 8 is a block diagram of an intrusion detection device according to an embodiment of the present application;
FIG. 9 is a block diagram of a multi-channel video surveillance system according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of an electronic device according to an embodiment of the application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more clearly understood, the present application is described and illustrated below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of and not restrictive on the broad application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments provided in the present application without any inventive step are within the scope of protection of the present application. Moreover, it should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which may vary from one implementation to another.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the specification. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of ordinary skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments without conflict.
Unless defined otherwise, technical or scientific terms referred to herein shall have the ordinary meaning as understood by those of ordinary skill in the art to which this application belongs. The use of the terms "a" and "an" and "the" and similar referents in the context of describing the invention (including a single reference) are to be construed in a non-limiting sense as indicating either the singular or the plural. The use of the terms "including," "comprising," "having," and any variations thereof herein, is meant to cover a non-exclusive inclusion; for example, a process, method, system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to the listed steps or elements, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. Reference to "connected," "coupled," and the like in this application is not intended to be limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. Reference herein to "a plurality" means greater than or equal to two. "and/or" describes an association relationship of associated objects, meaning that three relationships may exist, for example, "A and/or B" may mean: a exists alone, A and B exist simultaneously, and B exists alone. Reference herein to the terms "first," "second," "third," and the like, are merely to distinguish similar objects and do not denote a particular ordering for the objects.
Fig. 1 is a flowchart of an intrusion detection method according to an embodiment of the present application, and as shown in fig. 1, the method includes:
step S101, an image sequence to be detected is obtained, wherein the frame rate of the image sequence is a first frame rate.
And step S102, carrying out moving object detection on the multi-frame images in the image sequence according to the second frame rate, and judging whether the current frame image in the image sequence has an object moving in a preset area.
Step S103, under the condition that the current frame image has an object moving in a preset area, carrying out intrusion behavior detection on images of preset frame numbers before and/or after the current frame image according to a first frame rate, wherein the first frame rate is greater than a second frame rate.
And step S104, sending alarm information under the condition that at least one frame of image before the current frame of image and/or after the current frame of image has intrusion behaviors.
In this embodiment, the first frame rate may be 12FPS, 16FPS, 24FPS, etc., and the second frame rate may be 4FPS, 6FPS, etc., and the image may be a YUV image, taking the first frame rate as 12FPS and the second frame rate as 4FPS as an example.
The frame rate of the image sequence to be detected is 12FPS, and the moving object detection on the image sequence is performed according to 4FPS, that is, one frame of image is processed every two frames of images in the image sequence, and the image sequence is roughly detected.
And when suspicious behaviors are detected in the current frame image, namely under the condition that an object moving in a preset area exists, carrying out intrusion behavior detection on images of preset frame numbers before and/or after the current frame image according to 12FPS (field programmable gate array), and carrying out complex detection on the image sequence.
The intrusion behavior detection can be realized by judging whether a tripwire event occurs in the image or judging whether personnel entering and exiting a preset area in the image are users with access authority, and the rule setting of the intrusion behavior can be input and set by the users in the initialization stage.
In the related art, the processing frame rate of the back-end processing device is often reduced to increase the processing number of video channels, and further improve the detection efficiency of intrusion behavior detection of the monitoring system. For example, intrusion behavior detection requires capturing at least three actions of a target: the target is outside the area, the target is superposed with the area line, and the target is in the area, and the intrusion behavior of the target can be judged only if the three continuous actions are captured. Therefore, if the processing frame rate of the back-end processing device is lowered, there is a possibility that one of the operations may not be captured.
In this embodiment, whether suspicious behavior appears in the current frame image is detected through the low frame rate, and under the condition that suspicious behavior appears in the current frame image, whether invasion behavior appears in the multiframe images before and after the current frame image is detected again through the high frame rate, because in the multichannel video monitoring system, the extreme condition that invasion behavior appears in the multichannel video channel at the same moment almost can not appear, the probability that the calculation load is insufficient that the multichannel video channel detects the high frame rate simultaneously is extremely low, therefore, through this application, the calculation load of the rear-end processing device is saved promptly, and then the quantity of video channel simultaneous processing of the rear-end processing device is improved, and the accuracy rate of monitoring system invasion behavior detection is also guaranteed.
In some embodiments, performing moving object detection on multiple frames of images in the image sequence at the second frame rate, and determining whether there is an object moving within a preset area in a current frame of image in the image sequence includes: carrying out intrusion behavior detection on the multi-frame images in the image sequence according to the second frame rate, and judging whether the current frame image in the image sequence has intrusion behavior or not; under the condition that no invasion action exists in the current frame image, carrying out moving target detection on the current frame image, and judging whether a target moving in a preset area exists in the current frame image or not; and sending alarm information under the condition that the intrusion behavior exists in the current frame image.
In this embodiment, before performing moving object detection on the current frame image, intrusion behavior detection needs to be performed on the current frame image according to the second frame rate, and if an intrusion behavior has occurred in the current frame image, alarm information is directly sent, so that whether the intrusion behavior occurs can be determined based on whether a trip wire event occurs in the current frame image. For example: before moving target detection is carried out on a current frame image, the situations that a target is outside an tripwire arrow and the target is on the tripwire exist in the detected images of the first two frames of the current frame image respectively, and when the target appears in the tripwire arrow in the current frame image, it is judged that intrusion behaviors appear in the current frame image, alarm information is directly sent at the moment, and the intrusion behaviors are prevented from being detected untimely due to delay.
In some of these embodiments, moving object detection comprises: determining that a preset area in the current frame image covers a preset tripwire in the current frame image; carrying out motion detection on the preset area to obtain a motion area in the preset area; carrying out target detection on the current frame image to obtain a plurality of targets in the current frame image; and judging whether the position area and the motion area of the target are overlapped, and determining that the target moving in the preset area exists in the current frame image under the condition that the position area and the motion area of the target are overlapped.
In this embodiment, the current frame image is provided with a tripwire in advance, and the preset area covers the tripwire preset in the current frame image, and in this embodiment, the tripwire includes at least one of: fig. 2 is a schematic diagram of a preset area arrangement according to a first embodiment of the application, and as shown in fig. 2, in some embodiments, in a case that the trip wire includes a one-way trip wire, the preset area covers the one-way trip wire, a coverage area of the preset area on an arrow side of the one-way trip wire is larger than a coverage area of the preset area on the other side of the one-way trip wire, and a shaded area in fig. 2 is the preset area.
In the above embodiment, the arrow side of the one-way tripwire is generally an intrusion protection area, and the personnel activity is less, so that the coverage area of the preset area can be widened, and the coverage area of the preset area on the other side of the one-way tripwire can be properly narrowed, so that the target is prevented from being frequently detected out as suspicious behavior.
FIG. 3 is a schematic diagram of a preset zone arrangement according to a second embodiment of the present application, as shown in FIG. 3, in some of the embodiments, in the case that the tripwire comprises a bidirectional tripwire, the preset zone covers the bidirectional tripwire, and the coverage of the preset zone on a first arrowhead side of the bidirectional tripwire is equal to the coverage on a second arrowhead side of the bidirectional tripwire.
In this embodiment, because two intrusion protection areas exist in the bidirectional tripwire, the coverage area of the preset area on the first arrow side of the bidirectional tripwire is equal to the coverage area on the second arrow side of the bidirectional tripwire, so that whether an object moves in the intrusion protection area can be effectively monitored.
Fig. 4 is a schematic diagram of a preset area setting according to a third embodiment of the present application, as shown in fig. 4, in some embodiments, the one-way trip wire may further include an inward area trip wire, where the trip wire forms an inner area, the inner area is an intrusion protection area, and at the same time, the movement of people is relatively small, so that the preset area may be expanded to multiple inside, and at the same time, the outer side of the preset area is as close to the trip wire as possible, so as to avoid that the movement of external people frequently detects suspicious behaviors.
Fig. 5 is a schematic diagram of a preset area setting according to a fourth embodiment of the present application, and as shown in fig. 5, in some embodiments, the one-way tripwire may further include an outward area tripwire, where an outer area is an intrusion protection area, and when the activity of a person in the outer area is small, the preset area may be expanded to the outside in many ways, and meanwhile, the inner side of the preset area is as close to the tripwire as possible, so as to avoid that a suspicious behavior is frequently detected by the movement of an internal person.
In the above embodiment, the preset area is required to cover the tripwire preset in the previous frame image, and even if a certain proportion of invalid frame images are determined to have suspicious behaviors, the valid frame images with the suspicious behaviors cannot be omitted, so that the accuracy of the monitoring system in detecting the intrusion behaviors is ensured.
In some embodiments, the intrusion detection of the image of the preset frame number before and/or after the current frame image at the first frame rate comprises: carrying out intrusion behavior detection on a plurality of frames of images in a buffer queue according to a first frame rate, wherein the buffer queue comprises images of a preset frame number before a current frame of image; and under the condition that the images with the preset frame number in the cache queue do not have the intrusion behavior, detecting the intrusion behavior of the images with the preset frame number behind the current frame image according to the first frame rate.
Fig. 6 is a schematic flow diagram of each frame of image in an image sequence according to an embodiment of the present application, as shown in fig. 6, when a back-end processing device performs intrusion behavior detection on each frame of image, a buffer queue of a fixed length is always maintained, which is used for continuous images with a preset number of frames of the current frame of image, a frame rate of the image sequence to be detected is 12FPS, and motion target detection on the image sequence is performed according to 4FPS, that is, one frame of image is processed every two frames of image in the image sequence, and coarse detection on the image sequence is performed, for example, an image in a shadow area in fig. 6 is an image subjected to coarse detection.
As shown in fig. 6, the buffer queue stores continuous 8-frame images including undetected images, and when a current frame image is detected to have a target moving in a preset region, the continuous N-frame images may be extracted from the buffer queue, and whether an intrusion behavior occurs in the N-frame images in the buffer queue is detected according to a first frame rate; and under the condition that the N frames of images have no intrusion behavior, carrying out intrusion behavior detection on the M frames of images behind the current frame of image according to the first frame rate.
For example, in fig. 6, if YUV9 is a current frame image and it is determined that there is a target moving in a preset area, taking a previous N frames (for example, N = 2) of images from the buffer queue, that is, extracting YUV8 and YUV9, and detecting whether an intrusion behavior occurs in YUV8 and YUV9 according to a first frame rate; if no intrusion behavior occurs in YUV8 and YUV9, detecting M (taking M =3 as an example) images subsequent to YUV9 according to the first frame rate, namely detecting whether intrusion behaviors exist in YUV10, YUV11 and YUV12, and after the detection is finished, recovering the detection mode of the second frame rate by the back-end processing device.
In some of these embodiments, before acquiring the sequence of images to be detected, the method further comprises: acquiring a video to be detected by using a camera device, wherein the frame rate of the video to be detected is a third frame rate; and performing uniform frame loss processing on the video to be detected to obtain an image sequence to be detected with a frame rate of a first frame rate, wherein the third frame rate is greater than the first frame rate.
In this embodiment, a plurality of image capturing devices may access a backend processing device through a network or a video data transmission line such as a coaxial cable, and each image capturing device monitors a scene, which is called a video channel.
For the video input of each video channel, each frame of YUV image acquired by the camera device can be obtained in a decoding or AD acquisition mode. In order to balance the performance and the detection effect of intrusion behavior detection, the back-end processing device does not need to process each frame of YUV image in a full frame, for example, the frame rate of the video to be detected input to the back-end processing device is the third frame rate (for example, the third frame rate is 25 FPS), and an image sequence to be detected with the first frame rate (for example, the first frame rate is 12 FPS) is obtained through uniform frame dropping processing.
Through the steps from S101 to S104, whether suspicious behaviors appear in the current frame image is detected roughly through the low frame rate, and whether intrusion behaviors appear in the multi-frame images before and after the current frame image is detected again through the high frame rate under the condition that the suspicious behaviors appear in the current frame image. By the method and the device, the problem of low accuracy rate of the monitoring system for detecting the intrusion behavior in the related technology is solved, and the technical effect of improving the accuracy rate of the monitoring system for detecting the intrusion behavior is achieved.
Fig. 7 is a flowchart of an intrusion behavior detection method according to a preferred embodiment of the present application, as shown in fig. 7, the method includes:
step S701, detecting whether an intrusion behavior appears in the current frame image according to a second frame rate, and entering step S707 when the intrusion behavior appears in the current frame image; if no intrusion has occurred in the current frame image, the process proceeds to step S702.
Step S702, detecting whether a suspicious behavior appears in the current frame image according to a second frame rate, and entering step S703 under the condition that the suspicious behavior appears in the current frame image; and proceeds to step S706 if no suspicious behavior is present in the current frame image.
In step S703, an image of a preset frame number before the current frame image in the buffer queue is extracted.
Step S704, detecting whether an image with a preset frame number has an intrusion behavior according to a first frame rate, and entering step S707 when the image with the preset frame number has the intrusion behavior; if no intrusion is detected in any of the images of the preset number of frames, the process proceeds to step S705.
Step S705, detecting whether an image with a preset frame number behind a current frame image has an intrusion behavior according to a first frame rate, and entering step S707 when the image with the preset frame number has the intrusion behavior; if no intrusion is detected in any of the images of the preset number of frames, the process proceeds to step S706.
In step S706, the back-end processing apparatus resumes the detection mode of the second frame rate.
Step S707, alarm information is transmitted.
It should be noted that, for specific examples in this embodiment, reference may be made to examples described in the foregoing embodiments and optional implementations, and details of this embodiment are not described herein again.
Fig. 8 is a block diagram of an intrusion detection apparatus according to an embodiment of the present application, and as shown in fig. 8, the apparatus includes: an obtaining module 80, configured to obtain an image sequence to be detected, where a frame rate of the image sequence is a first frame rate; the first detection module 81 is configured to perform moving object detection on multiple frames of images in the image sequence according to the second frame rate, and determine whether an object moving in a preset area exists in a current frame of image in the image sequence; a second detection module 82, configured to, when a current frame image has an object moving in a preset region, perform intrusion behavior detection on an image of a preset frame number before and/or after the current frame image according to a first frame rate, where the first frame rate is greater than a second frame rate; and the alarm module 83 is configured to send alarm information when an intrusion behavior exists in at least one frame of image before the current frame of image and/or after the current frame of image.
In some embodiments, the first detection module 81 is further configured to perform intrusion behavior detection on multiple frames of images in the image sequence at a second frame rate, and determine whether an intrusion behavior exists in a current frame of image in the image sequence; under the condition that the intrusion behavior does not exist in the current frame image, carrying out moving object detection on the current frame image, and judging whether an object moving in a preset area exists in the current frame image or not; and sending alarm information under the condition that the intrusion behavior exists in the current frame image.
In some embodiments, the first detecting module 81 is further configured to determine that a preset area in the current frame image covers a preset tripwire in the current frame image; carrying out motion detection on the preset area to obtain a motion area in the preset area; carrying out target detection on the current frame image to obtain a plurality of targets in the current frame image; and judging whether the position area and the motion area of the target are overlapped, and determining that the target moving in the preset area exists in the current frame image under the condition that the position area and the motion area of the target are overlapped.
In some of these embodiments, the trip wire comprises at least one of: one-way tripwires and two-way tripwires; under the condition that the trip wire comprises a one-way trip wire, a preset area covers the one-way trip wire, and the coverage area of the preset area on the arrow side of the one-way trip wire is larger than that on the other side of the one-way trip wire; or in the case that the tripwire comprises a bidirectional tripwire, the preset area covers the bidirectional tripwire, and the coverage of the preset area on a first arrow side of the bidirectional tripwire is equal to the coverage of the preset area on a second arrow side of the bidirectional tripwire.
In some embodiments, the second detection module 82 is further configured to perform intrusion behavior detection on multiple frames of images in a buffer queue at a first frame rate, where the buffer queue includes a preset number of frames of images before a current frame of image; and under the condition that the images with the preset frame number in the cache queue do not have the intrusion behavior, detecting the intrusion behavior of the images with the preset frame number behind the current frame image according to the first frame rate.
In some embodiments, the apparatus further includes a preprocessing module, configured to acquire a video to be detected by using the camera apparatus, where a frame rate of the video to be detected is a third frame rate; and performing uniform frame loss processing on the video to be detected to obtain an image sequence to be detected with a frame rate of a first frame rate, wherein the third frame rate is greater than the first frame rate.
It should be noted that, for specific examples in this embodiment, reference may be made to examples described in the foregoing embodiments and optional implementations, and details of this embodiment are not described herein again.
The intrusion detection method provided by the foregoing embodiment may be implemented by a multi-channel video surveillance system, and fig. 9 is a block diagram of a structure of the multi-channel video surveillance system according to the embodiment of the present application, as shown in fig. 9, in some embodiments, the method may include: the system comprises a plurality of camera devices 90, wherein each camera device 90 is used for acquiring a video to be detected of one video channel; and a back-end processing device 91, wherein the back-end processing device 91 is in communication connection with each image pickup device 90, and the back-end processing device 91 is used for executing the intrusion behavior detection method of the embodiment.
Wherein, the back-end processing apparatus 91 may include NVR (Network Video Recorder, NVR for short) equipment or DVR (Digital Video Recorder, DVR for short) equipment, a plurality of CAMERA apparatuses 90 access a back-end processing apparatus 91 through Video data transmission lines such as Network or coaxial cable, each CAMERA apparatus 90 monitors a scene, which is called a Video channel, and the CAMERA apparatus 90 may include IPC (internet protocol CAMERA, IP CAMERA, IPC for short) or analog CAMERA.
It should be noted that, for specific examples in this embodiment, reference may be made to examples described in the foregoing embodiments and optional implementations, and details of this embodiment are not described herein again.
Fig. 10 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present application, and as shown in fig. 10, the electronic device includes a memory 1004 and a processor 1002, where the memory 1004 stores a computer program, and the processor 1002 is configured to execute the computer program to perform the steps in any one of the method embodiments.
Specifically, the processor 1002 may include a Central Processing Unit (CPU), or A Specific Integrated Circuit (ASIC), or may be configured to implement one or more Integrated circuits of the embodiments of the present Application.
Memory 1004 may include, among other things, mass storage for data or instructions. By way of example, and not limitation, memory 1004 may include a Hard Disk Drive (Hard Disk Drive, abbreviated HDD), a floppy Disk Drive, a Solid State Drive (SSD), flash memory, an optical Disk, a magneto-optical Disk, magnetic tape, or a Universal Serial Bus (USB) Drive or a combination of two or more of these. Memory 1004 may include removable or non-removable (or fixed) media, where appropriate. The memory 1004 may be internal or external to the data processing apparatus, where appropriate. In a particular embodiment, the memory 1004 is a Non-Volatile (Non-Volatile) memory. In certain embodiments, memory 1004 includes Read-Only Memory (ROM) and Random Access Memory (RAM). The ROM may be mask-programmed ROM, programmable ROM (PROM), erasable PROM (EPROM), electrically Erasable PROM (EEPROM), electrically rewritable ROM (EAROM), or FLASH Memory (FLASH), or a combination of two or more of these, where appropriate. The RAM may be a Static Random-Access Memory (SRAM) or a Dynamic Random-Access Memory (DRAM), where the DRAM may be a Fast Page Mode Dynamic Random-Access Memory (FPMDRAM), an Extended data output Dynamic Random-Access Memory (EDODRAM), a Synchronous Dynamic Random-Access Memory (SDRAM), and the like.
The memory 1004 may be used to store or cache various data files that are used in connection with processing and/or communication, as well as possibly computer program instructions, executed by the processor 1002.
The processor 1002 may implement any one of the intrusion detection methods in the above embodiments by reading and executing computer program instructions stored in the memory 1004.
Optionally, the electronic apparatus may further include a transmission device 1006 and an input/output device 1008, wherein the transmission device 1006 is connected to the processor 1002, and the input/output device 1008 is connected to the processor 1002.
Alternatively, in this embodiment, the processor 1002 may be configured to execute the following steps by a computer program:
s1, an image sequence to be detected is obtained, wherein the frame rate of the image sequence is a first frame rate.
And S2, detecting moving targets of the multiple frames of images in the image sequence according to a second frame rate, and judging whether targets moving in a preset area exist in the current frame of images in the image sequence.
And S3, under the condition that the current frame image has an object moving in a preset area, carrying out intrusion behavior detection on the images of preset frame numbers before and/or after the current frame image according to a first frame rate, wherein the first frame rate is greater than a second frame rate.
And S4, sending alarm information under the condition that at least one frame of image before the current frame of image and/or after the current frame of image has intrusion behaviors.
It should be noted that, for specific examples in this embodiment, reference may be made to examples described in the foregoing embodiments and optional implementations, and details of this embodiment are not described herein again.
In addition, in combination with the intrusion behavior detection method in the foregoing embodiment, the embodiment of the present application may provide a storage medium to implement. The storage medium having stored thereon a computer program; the computer program, when executed by a processor, implements any of the intrusion behavior detection methods in the above embodiments.
It should be understood by those skilled in the art that various features of the above embodiments can be combined arbitrarily, and for the sake of brevity, all possible combinations of the features in the above embodiments are not described, but should be considered as within the scope of the present disclosure as long as there is no contradiction between the combinations of the features.
The above examples only express several embodiments of the present application, and the description thereof is more specific and detailed, but not to be construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, and these are all within the scope of protection of the present application. Therefore, the protection scope of the present application should be subject to the appended claims.

Claims (10)

1. A method for intrusion behavior detection, the method comprising:
acquiring an image sequence to be detected, wherein the frame rate of the image sequence is a first frame rate;
detecting a moving target of a plurality of frames of images in the image sequence according to a second frame rate, and judging whether a target moving in a preset area exists in a current frame of image in the image sequence;
under the condition that the current frame image has a target moving in a preset area, carrying out intrusion behavior detection on images with preset frame numbers before and/or after the current frame image according to the first frame rate, wherein the first frame rate is greater than the second frame rate;
and sending alarm information under the condition that at least one frame of image before the current frame of image and/or after the current frame of image has intrusion behaviors.
2. The intrusion behavior detection method according to claim 1, wherein performing moving object detection on multiple frames of images in the image sequence at a second frame rate, and determining whether an object moving in a preset area exists in a current frame of image in the image sequence comprises:
carrying out intrusion behavior detection on the multi-frame images in the image sequence according to the second frame rate, and judging whether the current frame image in the image sequence has intrusion behavior or not;
under the condition that the intrusion behavior does not exist in the current frame image, carrying out moving object detection on the current frame image, and judging whether an object moving in a preset area exists in the current frame image or not;
and sending alarm information under the condition that the intrusion behavior exists in the current frame image.
3. The intrusion behavior detection method according to claim 1, wherein the moving object detection includes:
determining that a preset area in the current frame image covers a preset tripwire in the current frame image;
carrying out motion detection on the preset area to obtain a motion area in the preset area;
carrying out target detection on the current frame image to obtain a plurality of targets in the current frame image;
judging whether the position area of the target is overlapped with the motion area, and determining that the target moving in a preset area exists in the current frame image under the condition that the position area of the target is overlapped with the motion area.
4. The intrusion behavior detection method of claim 3, wherein the trip wire comprises at least one of: one-way tripwires and two-way tripwires;
under the condition that the trip wire comprises a one-way trip wire, the preset area covers the one-way trip wire, and the coverage area of the preset area on the arrow side of the one-way trip wire is larger than the coverage area on the other side of the one-way trip wire;
or in the case that the tripwire comprises a bidirectional tripwire, the preset area covers the bidirectional tripwire, and the coverage of the preset area on the first arrow side of the bidirectional tripwire is equal to the coverage of the preset area on the second arrow side of the bidirectional tripwire.
5. The intrusion detection method according to claim 1, wherein performing intrusion detection on images of a preset number of frames before and/or after the current frame image according to the first frame rate comprises:
carrying out intrusion behavior detection on the multi-frame images in a cache queue according to the first frame rate, wherein the cache queue comprises images of a preset frame number before the current frame image;
and under the condition that the images with the preset frame number in the cache queue have no intrusion behavior, detecting the intrusion behavior of the images with the preset frame number after the current frame image according to the first frame rate.
6. The intrusion behavior detection method according to claim 1, wherein before acquiring the sequence of images to be detected, the method further comprises:
acquiring a video to be detected by using a camera device, wherein the frame rate of the video to be detected is a third frame rate;
and performing uniform frame loss processing on the video to be detected to obtain an image sequence to be detected with a frame rate of a first frame rate, wherein the third frame rate is greater than the first frame rate.
7. An intrusion behavior detection apparatus, the apparatus comprising:
the device comprises an acquisition module, a processing module and a display module, wherein the acquisition module is used for acquiring an image sequence to be detected, and the frame rate of the image sequence is a first frame rate;
the first detection module is used for carrying out moving target detection on a plurality of frames of images in the image sequence according to a second frame rate and judging whether a target moving in a preset area exists in a current frame of image in the image sequence;
the second detection module is used for detecting intrusion behaviors of images with preset frame numbers before and/or after the current frame image according to the first frame rate under the condition that the current frame image has a target moving in a preset area, wherein the first frame rate is greater than the second frame rate;
and the alarm module is used for sending alarm information under the condition that at least one frame of image before the current frame of image and/or after the current frame of image has an intrusion behavior.
8. A multi-channel video surveillance system, the system comprising:
the system comprises a plurality of camera devices, a video acquisition device and a video processing device, wherein each camera device is used for acquiring a video to be detected of one video channel;
a back-end processing device, communicatively connected to each of the image capturing devices, respectively, the back-end processing device being configured to execute the intrusion behavior detection method according to any one of claims 1 to 6.
9. An electronic device comprising a memory and a processor, wherein the memory has stored therein a computer program, and the processor is configured to execute the computer program to perform the intrusion behavior detection method according to any one of claims 1 to 6.
10. A storage medium, in which a computer program is stored, wherein the computer program, when executed by a processor, implements the intrusion behavior detection method according to any one of claims 1 to 6.
CN202110570339.5A 2021-05-25 2021-05-25 Intrusion behavior detection method and device and multi-channel video monitoring system Active CN113393629B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110570339.5A CN113393629B (en) 2021-05-25 2021-05-25 Intrusion behavior detection method and device and multi-channel video monitoring system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110570339.5A CN113393629B (en) 2021-05-25 2021-05-25 Intrusion behavior detection method and device and multi-channel video monitoring system

Publications (2)

Publication Number Publication Date
CN113393629A CN113393629A (en) 2021-09-14
CN113393629B true CN113393629B (en) 2022-11-15

Family

ID=77618959

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110570339.5A Active CN113393629B (en) 2021-05-25 2021-05-25 Intrusion behavior detection method and device and multi-channel video monitoring system

Country Status (1)

Country Link
CN (1) CN113393629B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114245033A (en) * 2021-11-03 2022-03-25 浙江大华技术股份有限公司 Video synthesis method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004056473A (en) * 2002-07-19 2004-02-19 Matsushita Electric Ind Co Ltd Monitoring controller
CN104021570A (en) * 2014-06-04 2014-09-03 电子科技大学 Method for directional cross-border detection and mixing line detection in video
CN111079612A (en) * 2019-12-09 2020-04-28 北京国网富达科技发展有限责任公司 Method and device for monitoring retention of invading object in power transmission line channel
CN112823506A (en) * 2018-10-19 2021-05-18 索尼公司 Sensor device and signal processing method

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030107648A1 (en) * 2001-12-12 2003-06-12 Richard Stewart Surveillance system and method with adaptive frame rate
JP2005175853A (en) * 2003-12-10 2005-06-30 Canon Inc Imaging apparatus and imaging system
KR101498124B1 (en) * 2008-10-23 2015-03-05 삼성전자주식회사 Apparatus and method for improving frame rate using motion trajectory
JP5204707B2 (en) * 2009-03-30 2013-06-05 セコム株式会社 Image monitoring device
RU2013102854A (en) * 2013-01-30 2014-08-10 ЭлЭсАй Корпорейшн METHOD AND DEVICE FOR INCREASING PERSONNEL FREQUENCY OF IMAGE FLOW WITH USE, AT LEAST, ONE IMAGE FLOW WITH MORE HIGH FRAME
CN112506653A (en) * 2020-12-03 2021-03-16 浙江大华技术股份有限公司 Frame extraction frame rate adjusting method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004056473A (en) * 2002-07-19 2004-02-19 Matsushita Electric Ind Co Ltd Monitoring controller
CN104021570A (en) * 2014-06-04 2014-09-03 电子科技大学 Method for directional cross-border detection and mixing line detection in video
CN112823506A (en) * 2018-10-19 2021-05-18 索尼公司 Sensor device and signal processing method
CN111079612A (en) * 2019-12-09 2020-04-28 北京国网富达科技发展有限责任公司 Method and device for monitoring retention of invading object in power transmission line channel

Also Published As

Publication number Publication date
CN113393629A (en) 2021-09-14

Similar Documents

Publication Publication Date Title
US10123051B2 (en) Video analytics with pre-processing at the source end
EP2378461B1 (en) Pipeline architecture for analyzing multiple video streams
US9143739B2 (en) Video analytics with burst-like transmission of video data
KR100696728B1 (en) Apparatus and method for sending monitoring information
US10075680B2 (en) Video-surveillance method, corresponding system, and computer program product
CN111163259A (en) Image capturing method, monitoring camera and monitoring system
KR101365237B1 (en) Surveilance camera system supporting adaptive multi resolution
CN107959812B (en) Monitoring data storage method, device and system and routing equipment
US7551804B2 (en) Method and apparatus for distributed analysis of images
CN110198475B (en) Video processing method, device, equipment, server and readable storage medium
CN113393629B (en) Intrusion behavior detection method and device and multi-channel video monitoring system
CN109410278A (en) A kind of object localization method, apparatus and system
US9076268B2 (en) Method and system for analyzing multi-channel images
US7663661B2 (en) Feed-customized processing of multiple video streams in a pipeline architecture
JP2010166288A (en) Video output method, video output device, and monitored video output system
KR20120052864A (en) Tansmission apparatus and transmission method
WO2001008416A1 (en) Digital image recording system
EP3629577B1 (en) Data transmission method, camera and electronic device
KR101049574B1 (en) Event processing device and method using bookmarks
US7667732B1 (en) Event generation and camera cluster analysis of multiple video streams in a pipeline architecture
CN115836516B (en) Monitoring system
CN113205079B (en) Face detection method and device, electronic equipment and storage medium
US7664183B2 (en) Correlation processing among multiple analyzers of video streams at stages of a pipeline architecture
KR20110066748A (en) Image diversified searching method and central server used therein
CN112738387A (en) Target snapshot method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant